Management with adaptable practices
We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.
Social Engineering Training Course Outline
Introduction to Social Engineering
Social Engineering Types
- Telephone
- Baiting
- Fax
- Pretexting
Influencing Techniques
Overview of Elicitation
- Flattery
- False Statements
- Artificial Ignorance
- Sounding Board
- Bracketing
- Confidential Baiting
Basics of Pretexting
- Research and Planning
- Legal Considerations
- Body Language
Information Gathering Basics
- Information Organisation Overview
- Dradis Framework
- Sources of Information
Computer-Based and Physical Tools
- Kali Linux
- Social Engineering Toolkit (SET)
- Metasploit Framework
- Maltego
- Cameras and GPS
- Telephone and Lock Picking
Who should attend?
Anyone who wishes to enhance their knowledge of social engineering can attend this course. Professionals who wish to learn how to secure systems from social engineering attacks can also attend this course.
Prerequisites
There are no formal prerequisites for this course.
Social Engineering Training Course Overview
Social engineering refers to the art of manipulating people to gain access to confidential data for fraudulent purposes. It is a term used for a wide range of malicious activities accomplished through human interactions.
Because social engineering relies on human error rather than vulnerabilities in software and operating systems, it requires a different approach to traditional network security.
This Social Engineering course is designed to provide knowledge to defend against social engineering tricks. During this training, delegates will learn about various influencing techniques including reciprocity, scarcity, and likability.
They will also become familiarised with common elicitation techniques, as well as pretexting. By the end of the course, you will understand the various computer-based and physical tools of social engineering, including the Social Engineering Toolkit (SET).
What’s Included
- The Knowledge Academy’s Social Engineering Training Manual
- Experienced Instructor
- Completion Certificate
BCS CISMP (Certificate in Information Security Management Principles) Exam Information
This BCS CISMP (Certificate in Information Security Management Principles) exam is formatted in the following way:
- Type: Multiple Choice
- Duration: 2 Hours
- Supervised: Yes
- Open Book: No
- Total questions: 100
- Pass Mark: 65/100 (65%)